We actively support the following versions of SyncKit with security updates:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ✅ |
| < 0.1.0 | ❌ |
Please do NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in SyncKit, please report it to us privately:
-
Email: [email protected] (preferred)
- Subject: "[SECURITY] SyncKit - Brief description"
- Include: Detailed description, steps to reproduce, impact assessment
-
GitHub Security Advisory
- Visit: https://github.com/Dancode-188/synckit/security/advisories
- Click "Report a vulnerability"
Please include as much information as possible:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Full description of the vulnerability
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment (who is affected, severity)
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: We aim to patch critical vulnerabilities within 30 days
We will:
- Acknowledge your email within 48 hours
- Keep you informed of our progress
- Credit you in the security advisory (unless you prefer to remain anonymous)
- Work with you to understand and resolve the issue
- Please give us reasonable time to address the vulnerability before public disclosure
- We follow coordinated vulnerability disclosure practices
- We will credit researchers who report vulnerabilities responsibly
When using SyncKit in production:
- Keep Updated: Always use the latest stable version
- Authentication: Implement proper authentication for your sync server
- Authorization: Use RBAC to control document access
- HTTPS Only: Always use HTTPS/WSS in production
- Input Validation: Validate all user input before syncing
- Rate Limiting: Implement rate limiting on your server
- Monitoring: Monitor for unusual sync patterns
SyncKit is designed with security in mind:
- Data Encryption: Transport encryption via WSS (WebSocket Secure)
- Authentication: JWT-based authentication system
- Authorization: Role-based access control (RBAC)
- Input Sanitization: All sync data is validated
- No Eval: No use of eval() or similar dangerous functions
- Day 0: Vulnerability reported privately
- Day 0-7: Vulnerability validated and fix developed
- Day 7-30: Patch released and deployed
- Day 30+: Public disclosure with credit to reporter
We currently do not have a formal bug bounty program, but we deeply appreciate security researchers who help keep SyncKit safe. We will acknowledge your contribution publicly (unless you prefer otherwise).
For any questions about this policy or security concerns:
- Email: [email protected]
- GitHub: @Dancode-188
Thank you for helping keep SyncKit and our users safe! 🛡️